1use std::{
16 collections::{BTreeMap, BTreeSet, HashMap, HashSet},
17 str::FromStr as _,
18 sync::Arc,
19};
20
21use async_trait::async_trait;
22use gloo_utils::format::JsValueSerdeExt;
23use growable_bloom_filter::GrowableBloom;
24use indexed_db_futures::{
25 cursor::CursorDirection, database::Database, error::OpenDbError, prelude::*,
26 transaction::TransactionMode, KeyRange,
27};
28use matrix_sdk_base::{
29 deserialized_responses::{DisplayName, RawAnySyncOrStrippedState},
30 store::{
31 compare_thread_subscription_bump_stamps, ChildTransactionId, ComposerDraft,
32 DependentQueuedRequest, DependentQueuedRequestKind, QueuedRequest, QueuedRequestKind,
33 RoomLoadSettings, SentRequestKey, SerializableEventContent, StateChanges, StateStore,
34 StoreError, StoredThreadSubscription, SupportedVersionsResponse, ThreadSubscriptionStatus,
35 TtlStoreValue, WellKnownResponse,
36 },
37 MinimalRoomMemberEvent, RoomInfo, RoomMemberships, StateStoreDataKey, StateStoreDataValue,
38 ThreadSubscriptionCatchupToken, ROOM_VERSION_FALLBACK, ROOM_VERSION_RULES_FALLBACK,
39};
40use matrix_sdk_store_encryption::{Error as EncryptionError, StoreCipher};
41use ruma::{
42 canonical_json::{redact, RedactedBecause},
43 events::{
44 presence::PresenceEvent,
45 receipt::{Receipt, ReceiptThread, ReceiptType},
46 room::member::{
47 MembershipState, RoomMemberEventContent, StrippedRoomMemberEvent, SyncRoomMemberEvent,
48 },
49 AnyGlobalAccountDataEvent, AnyRoomAccountDataEvent, AnySyncStateEvent,
50 GlobalAccountDataEventType, RoomAccountDataEventType, StateEventType, SyncStateEvent,
51 },
52 serde::Raw,
53 CanonicalJsonObject, EventId, MilliSecondsSinceUnixEpoch, OwnedEventId, OwnedMxcUri,
54 OwnedRoomId, OwnedTransactionId, OwnedUserId, RoomId, TransactionId, UserId,
55};
56use serde::{de::DeserializeOwned, ser::Error, Deserialize, Serialize};
57use tracing::{debug, warn};
58use wasm_bindgen::JsValue;
59
60mod migrations;
61
62pub use self::migrations::MigrationConflictStrategy;
63use self::migrations::{upgrade_inner_db, upgrade_meta_db};
64use crate::{error::GenericError, serializer::safe_encode::traits::SafeEncode};
65
66#[derive(Debug, thiserror::Error)]
67pub enum IndexeddbStateStoreError {
68 #[error(transparent)]
69 Json(#[from] serde_json::Error),
70 #[error(transparent)]
71 Encryption(#[from] EncryptionError),
72 #[error("DomException {name} ({code}): {message}")]
73 DomException { name: String, message: String, code: u16 },
74 #[error(transparent)]
75 StoreError(#[from] StoreError),
76 #[error(
77 "Can't migrate {name} from {old_version} to {new_version} without deleting data. \
78 See MigrationConflictStrategy for ways to configure."
79 )]
80 MigrationConflict { name: String, old_version: u32, new_version: u32 },
81}
82
83impl From<GenericError> for IndexeddbStateStoreError {
84 fn from(value: GenericError) -> Self {
85 Self::StoreError(value.into())
86 }
87}
88
89impl From<web_sys::DomException> for IndexeddbStateStoreError {
90 fn from(frm: web_sys::DomException) -> IndexeddbStateStoreError {
91 IndexeddbStateStoreError::DomException {
92 name: frm.name(),
93 message: frm.message(),
94 code: frm.code(),
95 }
96 }
97}
98
99impl From<IndexeddbStateStoreError> for StoreError {
100 fn from(e: IndexeddbStateStoreError) -> Self {
101 match e {
102 IndexeddbStateStoreError::Json(e) => StoreError::Json(e),
103 IndexeddbStateStoreError::StoreError(e) => e,
104 IndexeddbStateStoreError::Encryption(e) => StoreError::Encryption(e),
105 _ => StoreError::backend(e),
106 }
107 }
108}
109
110impl From<indexed_db_futures::error::DomException> for IndexeddbStateStoreError {
111 fn from(value: indexed_db_futures::error::DomException) -> Self {
112 web_sys::DomException::from(value).into()
113 }
114}
115
116impl From<indexed_db_futures::error::SerialisationError> for IndexeddbStateStoreError {
117 fn from(value: indexed_db_futures::error::SerialisationError) -> Self {
118 Self::Json(serde_json::Error::custom(value.to_string()))
119 }
120}
121
122impl From<indexed_db_futures::error::UnexpectedDataError> for IndexeddbStateStoreError {
123 fn from(value: indexed_db_futures::error::UnexpectedDataError) -> Self {
124 IndexeddbStateStoreError::StoreError(StoreError::backend(value))
125 }
126}
127
128impl From<indexed_db_futures::error::JSError> for IndexeddbStateStoreError {
129 fn from(value: indexed_db_futures::error::JSError) -> Self {
130 GenericError::from(value.to_string()).into()
131 }
132}
133
134impl From<indexed_db_futures::error::Error> for IndexeddbStateStoreError {
135 fn from(value: indexed_db_futures::error::Error) -> Self {
136 use indexed_db_futures::error::Error;
137 match value {
138 Error::DomException(e) => e.into(),
139 Error::Serialisation(e) => e.into(),
140 Error::MissingData(e) => e.into(),
141 Error::Unknown(e) => e.into(),
142 }
143 }
144}
145
146impl From<OpenDbError> for IndexeddbStateStoreError {
147 fn from(value: OpenDbError) -> Self {
148 match value {
149 OpenDbError::Base(error) => error.into(),
150 _ => GenericError::from(value.to_string()).into(),
151 }
152 }
153}
154
155mod keys {
156 pub const INTERNAL_STATE: &str = "matrix-sdk-state";
157 pub const BACKUPS_META: &str = "backups";
158
159 pub const ACCOUNT_DATA: &str = "account_data";
160
161 pub const PROFILES: &str = "profiles";
162 pub const DISPLAY_NAMES: &str = "display_names";
163 pub const USER_IDS: &str = "user_ids";
164
165 pub const ROOM_STATE: &str = "room_state";
166 pub const ROOM_INFOS: &str = "room_infos";
167 pub const PRESENCE: &str = "presence";
168 pub const ROOM_ACCOUNT_DATA: &str = "room_account_data";
169 pub const ROOM_SEND_QUEUE: &str = "room_send_queue";
171 pub const DEPENDENT_SEND_QUEUE: &str = "room_dependent_send_queue";
173 pub const THREAD_SUBSCRIPTIONS: &str = "room_thread_subscriptions";
174
175 pub const STRIPPED_ROOM_STATE: &str = "stripped_room_state";
176 pub const STRIPPED_USER_IDS: &str = "stripped_user_ids";
177
178 pub const ROOM_USER_RECEIPTS: &str = "room_user_receipts";
179 pub const ROOM_EVENT_RECEIPTS: &str = "room_event_receipts";
180
181 pub const CUSTOM: &str = "custom";
182 pub const KV: &str = "kv";
183
184 pub const ALL_STORES: &[&str] = &[
186 ACCOUNT_DATA,
187 PROFILES,
188 DISPLAY_NAMES,
189 USER_IDS,
190 ROOM_STATE,
191 ROOM_INFOS,
192 PRESENCE,
193 ROOM_ACCOUNT_DATA,
194 STRIPPED_ROOM_STATE,
195 STRIPPED_USER_IDS,
196 ROOM_USER_RECEIPTS,
197 ROOM_EVENT_RECEIPTS,
198 ROOM_SEND_QUEUE,
199 THREAD_SUBSCRIPTIONS,
200 DEPENDENT_SEND_QUEUE,
201 CUSTOM,
202 KV,
203 ];
204
205 pub const STORE_KEY: &str = "store_key";
208}
209
210pub use keys::ALL_STORES;
211use matrix_sdk_base::store::QueueWedgeError;
212
213fn serialize_value(store_cipher: Option<&StoreCipher>, event: &impl Serialize) -> Result<JsValue> {
215 Ok(match store_cipher {
216 Some(cipher) => {
217 let data = serde_json::to_vec(event)?;
218 JsValue::from_serde(&cipher.encrypt_value_data(data)?)?
219 }
220 None => JsValue::from_serde(event)?,
221 })
222}
223
224fn deserialize_value<T: DeserializeOwned>(
226 store_cipher: Option<&StoreCipher>,
227 event: &JsValue,
228) -> Result<T> {
229 match store_cipher {
230 Some(cipher) => {
231 use zeroize::Zeroize;
232 let mut plaintext = cipher.decrypt_value_data(event.into_serde()?)?;
233 let ret = serde_json::from_slice(&plaintext);
234 plaintext.zeroize();
235 Ok(ret?)
236 }
237 None => Ok(event.into_serde()?),
238 }
239}
240
241fn encode_key<T>(store_cipher: Option<&StoreCipher>, table_name: &str, key: T) -> JsValue
242where
243 T: SafeEncode,
244{
245 match store_cipher {
246 Some(cipher) => key.as_secure_string(table_name, cipher),
247 None => key.as_encoded_string(),
248 }
249 .into()
250}
251
252fn encode_to_range<T>(
253 store_cipher: Option<&StoreCipher>,
254 table_name: &str,
255 key: T,
256) -> KeyRange<JsValue>
257where
258 T: SafeEncode,
259{
260 match store_cipher {
261 Some(cipher) => key.encode_to_range_secure(table_name, cipher),
262 None => key.encode_to_range(),
263 }
264}
265
266#[derive(Debug)]
268pub struct IndexeddbStateStoreBuilder {
269 name: Option<String>,
270 passphrase: Option<String>,
271 migration_conflict_strategy: MigrationConflictStrategy,
272}
273
274impl IndexeddbStateStoreBuilder {
275 fn new() -> Self {
276 Self {
277 name: None,
278 passphrase: None,
279 migration_conflict_strategy: MigrationConflictStrategy::BackupAndDrop,
280 }
281 }
282
283 pub fn name(mut self, value: String) -> Self {
285 self.name = Some(value);
286 self
287 }
288
289 pub fn passphrase(mut self, value: String) -> Self {
293 self.passphrase = Some(value);
294 self
295 }
296
297 pub fn migration_conflict_strategy(mut self, value: MigrationConflictStrategy) -> Self {
301 self.migration_conflict_strategy = value;
302 self
303 }
304
305 pub async fn build(self) -> Result<IndexeddbStateStore> {
306 let migration_strategy = self.migration_conflict_strategy.clone();
307 let name = self.name.unwrap_or_else(|| "state".to_owned());
308
309 let meta_name = format!("{name}::{}", keys::INTERNAL_STATE);
310
311 let (meta, store_cipher) = upgrade_meta_db(&meta_name, self.passphrase.as_deref()).await?;
312 let inner =
313 upgrade_inner_db(&name, store_cipher.as_deref(), migration_strategy, &meta).await?;
314
315 Ok(IndexeddbStateStore { name, inner, meta, store_cipher })
316 }
317}
318
319pub struct IndexeddbStateStore {
320 name: String,
321 pub(crate) inner: Database,
322 pub(crate) meta: Database,
323 pub(crate) store_cipher: Option<Arc<StoreCipher>>,
324}
325
326#[cfg(not(tarpaulin_include))]
327impl std::fmt::Debug for IndexeddbStateStore {
328 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
329 f.debug_struct("IndexeddbStateStore").field("name", &self.name).finish()
330 }
331}
332
333type Result<A, E = IndexeddbStateStoreError> = std::result::Result<A, E>;
334
335impl IndexeddbStateStore {
336 pub fn builder() -> IndexeddbStateStoreBuilder {
338 IndexeddbStateStoreBuilder::new()
339 }
340
341 pub fn version(&self) -> u32 {
343 self.inner.version() as u32
344 }
345
346 pub fn meta_version(&self) -> u32 {
348 self.meta.version() as u32
349 }
350
351 pub async fn has_backups(&self) -> Result<bool> {
353 Ok(self
354 .meta
355 .transaction(keys::BACKUPS_META)
356 .with_mode(TransactionMode::Readonly)
357 .build()?
358 .object_store(keys::BACKUPS_META)?
359 .count()
360 .await?
361 > 0)
362 }
363
364 pub async fn latest_backup(&self) -> Result<Option<String>> {
366 if let Some(mut cursor) = self
367 .meta
368 .transaction(keys::BACKUPS_META)
369 .with_mode(TransactionMode::Readonly)
370 .build()?
371 .object_store(keys::BACKUPS_META)?
372 .open_cursor()
373 .with_direction(CursorDirection::Prev)
374 .await?
375 {
376 if let Some(record) = cursor.next_record::<JsValue>().await? {
377 return Ok(record.as_string());
378 }
379 }
380 Ok(None)
381 }
382
383 fn serialize_value(&self, event: &impl Serialize) -> Result<JsValue> {
385 serialize_value(self.store_cipher.as_deref(), event)
386 }
387
388 fn deserialize_value<T: DeserializeOwned>(&self, event: &JsValue) -> Result<T> {
390 deserialize_value(self.store_cipher.as_deref(), event)
391 }
392
393 fn encode_key<T>(&self, table_name: &str, key: T) -> JsValue
394 where
395 T: SafeEncode,
396 {
397 encode_key(self.store_cipher.as_deref(), table_name, key)
398 }
399
400 fn encode_to_range<T>(&self, table_name: &str, key: T) -> KeyRange<JsValue>
401 where
402 T: SafeEncode,
403 {
404 encode_to_range(self.store_cipher.as_deref(), table_name, key)
405 }
406
407 pub async fn get_user_ids_inner(
410 &self,
411 room_id: &RoomId,
412 memberships: RoomMemberships,
413 stripped: bool,
414 ) -> Result<Vec<OwnedUserId>> {
415 let store_name = if stripped { keys::STRIPPED_USER_IDS } else { keys::USER_IDS };
416
417 let tx = self.inner.transaction(store_name).with_mode(TransactionMode::Readonly).build()?;
418 let store = tx.object_store(store_name)?;
419 let range = self.encode_to_range(store_name, room_id);
420
421 let user_ids = if memberships.is_empty() {
422 store
424 .get_all()
425 .with_query(&range)
426 .await?
427 .filter_map(Result::ok)
428 .filter_map(|f| self.deserialize_value::<RoomMember>(&f).ok().map(|m| m.user_id))
429 .collect::<Vec<_>>()
430 } else {
431 let mut user_ids = Vec::new();
432 let cursor = store.open_cursor().with_query(&range).await?;
433
434 if let Some(mut cursor) = cursor {
435 while let Some(value) = cursor.next_record().await? {
436 let member = self.deserialize_value::<RoomMember>(&value)?;
437
438 if memberships.matches(&member.membership) {
439 user_ids.push(member.user_id);
440 }
441 }
442 }
443
444 user_ids
445 };
446
447 Ok(user_ids)
448 }
449
450 async fn get_custom_value_for_js(&self, jskey: &JsValue) -> Result<Option<Vec<u8>>> {
451 self.inner
452 .transaction(keys::CUSTOM)
453 .with_mode(TransactionMode::Readonly)
454 .build()?
455 .object_store(keys::CUSTOM)?
456 .get(jskey)
457 .await?
458 .map(|f| self.deserialize_value(&f))
459 .transpose()
460 }
461
462 fn encode_kv_data_key(&self, key: StateStoreDataKey<'_>) -> JsValue {
463 match key {
467 StateStoreDataKey::SyncToken => {
468 self.encode_key(StateStoreDataKey::SYNC_TOKEN, StateStoreDataKey::SYNC_TOKEN)
469 }
470 StateStoreDataKey::SupportedVersions => self.encode_key(
471 StateStoreDataKey::SUPPORTED_VERSIONS,
472 StateStoreDataKey::SUPPORTED_VERSIONS,
473 ),
474 StateStoreDataKey::WellKnown => {
475 self.encode_key(keys::KV, StateStoreDataKey::WELL_KNOWN)
476 }
477 StateStoreDataKey::Filter(filter_name) => {
478 self.encode_key(StateStoreDataKey::FILTER, (StateStoreDataKey::FILTER, filter_name))
479 }
480 StateStoreDataKey::UserAvatarUrl(user_id) => {
481 self.encode_key(keys::KV, (StateStoreDataKey::USER_AVATAR_URL, user_id))
482 }
483 StateStoreDataKey::RecentlyVisitedRooms(user_id) => {
484 self.encode_key(keys::KV, (StateStoreDataKey::RECENTLY_VISITED_ROOMS, user_id))
485 }
486 StateStoreDataKey::UtdHookManagerData => {
487 self.encode_key(keys::KV, StateStoreDataKey::UTD_HOOK_MANAGER_DATA)
488 }
489 StateStoreDataKey::OneTimeKeyAlreadyUploaded => {
490 self.encode_key(keys::KV, StateStoreDataKey::ONE_TIME_KEY_ALREADY_UPLOADED)
491 }
492 StateStoreDataKey::ComposerDraft(room_id, thread_root) => {
493 if let Some(thread_root) = thread_root {
494 self.encode_key(
495 keys::KV,
496 (StateStoreDataKey::COMPOSER_DRAFT, (room_id, thread_root)),
497 )
498 } else {
499 self.encode_key(keys::KV, (StateStoreDataKey::COMPOSER_DRAFT, room_id))
500 }
501 }
502 StateStoreDataKey::SeenKnockRequests(room_id) => {
503 self.encode_key(keys::KV, (StateStoreDataKey::SEEN_KNOCK_REQUESTS, room_id))
504 }
505 StateStoreDataKey::ThreadSubscriptionsCatchupTokens => {
506 self.encode_key(keys::KV, StateStoreDataKey::THREAD_SUBSCRIPTIONS_CATCHUP_TOKENS)
507 }
508 }
509 }
510}
511
512#[derive(Serialize, Deserialize)]
515struct PersistedQueuedRequest {
516 pub room_id: OwnedRoomId,
518
519 kind: Option<QueuedRequestKind>,
522 transaction_id: OwnedTransactionId,
523
524 pub error: Option<QueueWedgeError>,
525
526 priority: Option<usize>,
527
528 #[serde(default = "created_now")]
530 created_at: MilliSecondsSinceUnixEpoch,
531
532 is_wedged: Option<bool>,
535
536 event: Option<SerializableEventContent>,
537}
538
539fn created_now() -> MilliSecondsSinceUnixEpoch {
540 MilliSecondsSinceUnixEpoch::now()
541}
542
543impl PersistedQueuedRequest {
544 fn into_queued_request(self) -> Option<QueuedRequest> {
545 let kind =
546 self.kind.or_else(|| self.event.map(|content| QueuedRequestKind::Event { content }))?;
547
548 let error = match self.is_wedged {
549 Some(true) => {
550 Some(QueueWedgeError::GenericApiError {
552 msg: "local echo failed to send in a previous session".into(),
553 })
554 }
555 _ => self.error,
556 };
557
558 let priority = self.priority.unwrap_or(0);
560
561 Some(QueuedRequest {
562 kind,
563 transaction_id: self.transaction_id,
564 error,
565 priority,
566 created_at: self.created_at,
567 })
568 }
569}
570
571#[derive(Serialize, Deserialize, PartialEq)]
572struct PersistedThreadSubscription {
573 status: String,
574 bump_stamp: Option<u64>,
575}
576
577impl From<StoredThreadSubscription> for PersistedThreadSubscription {
578 fn from(value: StoredThreadSubscription) -> Self {
579 Self { status: value.status.as_str().to_owned(), bump_stamp: value.bump_stamp }
580 }
581}
582
583#[cfg(target_family = "wasm")]
592macro_rules! impl_state_store {
593 ({ $($body:tt)* }) => {
594 #[async_trait(?Send)]
595 impl StateStore for IndexeddbStateStore {
596 type Error = IndexeddbStateStoreError;
597
598 $($body)*
599 }
600 };
601}
602
603#[cfg(not(target_family = "wasm"))]
604macro_rules! impl_state_store {
605 ({ $($body:tt)* }) => {
606 impl IndexeddbStateStore {
607 $($body)*
608 }
609 };
610}
611
612impl_state_store!({
613 async fn get_kv_data(&self, key: StateStoreDataKey<'_>) -> Result<Option<StateStoreDataValue>> {
614 let encoded_key = self.encode_kv_data_key(key);
615
616 let value = self
617 .inner
618 .transaction(keys::KV)
619 .with_mode(TransactionMode::Readonly)
620 .build()?
621 .object_store(keys::KV)?
622 .get(&encoded_key)
623 .await?;
624
625 let value = match key {
626 StateStoreDataKey::SyncToken => value
627 .map(|f| self.deserialize_value::<String>(&f))
628 .transpose()?
629 .map(StateStoreDataValue::SyncToken),
630 StateStoreDataKey::SupportedVersions => value
631 .map(|f| self.deserialize_value::<TtlStoreValue<SupportedVersionsResponse>>(&f))
632 .transpose()?
633 .map(StateStoreDataValue::SupportedVersions),
634 StateStoreDataKey::WellKnown => value
635 .map(|f| self.deserialize_value::<TtlStoreValue<Option<WellKnownResponse>>>(&f))
636 .transpose()?
637 .map(StateStoreDataValue::WellKnown),
638 StateStoreDataKey::Filter(_) => value
639 .map(|f| self.deserialize_value::<String>(&f))
640 .transpose()?
641 .map(StateStoreDataValue::Filter),
642 StateStoreDataKey::UserAvatarUrl(_) => value
643 .map(|f| self.deserialize_value::<OwnedMxcUri>(&f))
644 .transpose()?
645 .map(StateStoreDataValue::UserAvatarUrl),
646 StateStoreDataKey::RecentlyVisitedRooms(_) => value
647 .map(|f| self.deserialize_value::<Vec<OwnedRoomId>>(&f))
648 .transpose()?
649 .map(StateStoreDataValue::RecentlyVisitedRooms),
650 StateStoreDataKey::UtdHookManagerData => value
651 .map(|f| self.deserialize_value::<GrowableBloom>(&f))
652 .transpose()?
653 .map(StateStoreDataValue::UtdHookManagerData),
654 StateStoreDataKey::OneTimeKeyAlreadyUploaded => value
655 .map(|f| self.deserialize_value::<bool>(&f))
656 .transpose()?
657 .map(|_| StateStoreDataValue::OneTimeKeyAlreadyUploaded),
658 StateStoreDataKey::ComposerDraft(_, _) => value
659 .map(|f| self.deserialize_value::<ComposerDraft>(&f))
660 .transpose()?
661 .map(StateStoreDataValue::ComposerDraft),
662 StateStoreDataKey::SeenKnockRequests(_) => value
663 .map(|f| self.deserialize_value::<BTreeMap<OwnedEventId, OwnedUserId>>(&f))
664 .transpose()?
665 .map(StateStoreDataValue::SeenKnockRequests),
666 StateStoreDataKey::ThreadSubscriptionsCatchupTokens => value
667 .map(|f| self.deserialize_value::<Vec<ThreadSubscriptionCatchupToken>>(&f))
668 .transpose()?
669 .map(StateStoreDataValue::ThreadSubscriptionsCatchupTokens),
670 };
671
672 Ok(value)
673 }
674
675 async fn set_kv_data(
676 &self,
677 key: StateStoreDataKey<'_>,
678 value: StateStoreDataValue,
679 ) -> Result<()> {
680 let encoded_key = self.encode_kv_data_key(key);
681
682 let serialized_value = match key {
683 StateStoreDataKey::SyncToken => self
684 .serialize_value(&value.into_sync_token().expect("Session data not a sync token")),
685 StateStoreDataKey::SupportedVersions => self.serialize_value(
686 &value
687 .into_supported_versions()
688 .expect("Session data not containing supported versions"),
689 ),
690 StateStoreDataKey::WellKnown => self.serialize_value(
691 &value.into_well_known().expect("Session data not containing well-known"),
692 ),
693 StateStoreDataKey::Filter(_) => {
694 self.serialize_value(&value.into_filter().expect("Session data not a filter"))
695 }
696 StateStoreDataKey::UserAvatarUrl(_) => self.serialize_value(
697 &value.into_user_avatar_url().expect("Session data not an user avatar url"),
698 ),
699 StateStoreDataKey::RecentlyVisitedRooms(_) => self.serialize_value(
700 &value
701 .into_recently_visited_rooms()
702 .expect("Session data not a recently visited room list"),
703 ),
704 StateStoreDataKey::UtdHookManagerData => self.serialize_value(
705 &value.into_utd_hook_manager_data().expect("Session data not UtdHookManagerData"),
706 ),
707 StateStoreDataKey::OneTimeKeyAlreadyUploaded => self.serialize_value(&true),
708 StateStoreDataKey::ComposerDraft(_, _) => self.serialize_value(
709 &value.into_composer_draft().expect("Session data not a composer draft"),
710 ),
711 StateStoreDataKey::SeenKnockRequests(_) => self.serialize_value(
712 &value
713 .into_seen_knock_requests()
714 .expect("Session data is not a set of seen knock request ids"),
715 ),
716 StateStoreDataKey::ThreadSubscriptionsCatchupTokens => self.serialize_value(
717 &value
718 .into_thread_subscriptions_catchup_tokens()
719 .expect("Session data is not a list of thread subscription catchup tokens"),
720 ),
721 };
722
723 let tx = self.inner.transaction(keys::KV).with_mode(TransactionMode::Readwrite).build()?;
724
725 let obj = tx.object_store(keys::KV)?;
726
727 obj.put(&serialized_value?).with_key(encoded_key).build()?;
728
729 tx.commit().await?;
730
731 Ok(())
732 }
733
734 async fn remove_kv_data(&self, key: StateStoreDataKey<'_>) -> Result<()> {
735 let encoded_key = self.encode_kv_data_key(key);
736
737 let tx = self.inner.transaction(keys::KV).with_mode(TransactionMode::Readwrite).build()?;
738 let obj = tx.object_store(keys::KV)?;
739
740 obj.delete(&encoded_key).build()?;
741
742 tx.commit().await?;
743
744 Ok(())
745 }
746
747 async fn save_changes(&self, changes: &StateChanges) -> Result<()> {
748 let mut stores: HashSet<&'static str> = [
749 (changes.sync_token.is_some(), keys::KV),
750 (!changes.ambiguity_maps.is_empty(), keys::DISPLAY_NAMES),
751 (!changes.account_data.is_empty(), keys::ACCOUNT_DATA),
752 (!changes.presence.is_empty(), keys::PRESENCE),
753 (
754 !changes.profiles.is_empty() || !changes.profiles_to_delete.is_empty(),
755 keys::PROFILES,
756 ),
757 (!changes.room_account_data.is_empty(), keys::ROOM_ACCOUNT_DATA),
758 (!changes.receipts.is_empty(), keys::ROOM_EVENT_RECEIPTS),
759 ]
760 .iter()
761 .filter_map(|(id, key)| if *id { Some(*key) } else { None })
762 .collect();
763
764 if !changes.state.is_empty() {
765 stores.extend([
766 keys::ROOM_STATE,
767 keys::USER_IDS,
768 keys::STRIPPED_USER_IDS,
769 keys::STRIPPED_ROOM_STATE,
770 keys::PROFILES,
771 ]);
772 }
773
774 if !changes.redactions.is_empty() {
775 stores.extend([keys::ROOM_STATE, keys::ROOM_INFOS]);
776 }
777
778 if !changes.room_infos.is_empty() {
779 stores.insert(keys::ROOM_INFOS);
780 }
781
782 if !changes.stripped_state.is_empty() {
783 stores.extend([keys::STRIPPED_ROOM_STATE, keys::STRIPPED_USER_IDS]);
784 }
785
786 if !changes.receipts.is_empty() {
787 stores.extend([keys::ROOM_EVENT_RECEIPTS, keys::ROOM_USER_RECEIPTS])
788 }
789
790 if stores.is_empty() {
791 return Ok(());
793 }
794
795 let stores: Vec<&'static str> = stores.into_iter().collect();
796 let tx = self.inner.transaction(stores).with_mode(TransactionMode::Readwrite).build()?;
797
798 if let Some(s) = &changes.sync_token {
799 tx.object_store(keys::KV)?
800 .put(&self.serialize_value(s)?)
801 .with_key(self.encode_kv_data_key(StateStoreDataKey::SyncToken))
802 .build()?;
803 }
804
805 if !changes.ambiguity_maps.is_empty() {
806 let store = tx.object_store(keys::DISPLAY_NAMES)?;
807 for (room_id, ambiguity_maps) in &changes.ambiguity_maps {
808 for (display_name, map) in ambiguity_maps {
809 let key = self.encode_key(
810 keys::DISPLAY_NAMES,
811 (
812 room_id,
813 display_name
814 .as_normalized_str()
815 .unwrap_or_else(|| display_name.as_raw_str()),
816 ),
817 );
818
819 store.put(&self.serialize_value(&map)?).with_key(key).build()?;
820 }
821 }
822 }
823
824 if !changes.account_data.is_empty() {
825 let store = tx.object_store(keys::ACCOUNT_DATA)?;
826 for (event_type, event) in &changes.account_data {
827 store
828 .put(&self.serialize_value(&event)?)
829 .with_key(self.encode_key(keys::ACCOUNT_DATA, event_type))
830 .build()?;
831 }
832 }
833
834 if !changes.room_account_data.is_empty() {
835 let store = tx.object_store(keys::ROOM_ACCOUNT_DATA)?;
836 for (room, events) in &changes.room_account_data {
837 for (event_type, event) in events {
838 let key = self.encode_key(keys::ROOM_ACCOUNT_DATA, (room, event_type));
839 store.put(&self.serialize_value(&event)?).with_key(key).build()?;
840 }
841 }
842 }
843
844 if !changes.state.is_empty() {
845 let state = tx.object_store(keys::ROOM_STATE)?;
846 let profiles = tx.object_store(keys::PROFILES)?;
847 let user_ids = tx.object_store(keys::USER_IDS)?;
848 let stripped_state = tx.object_store(keys::STRIPPED_ROOM_STATE)?;
849 let stripped_user_ids = tx.object_store(keys::STRIPPED_USER_IDS)?;
850
851 for (room, user_ids) in &changes.profiles_to_delete {
852 for user_id in user_ids {
853 let key = self.encode_key(keys::PROFILES, (room, user_id));
854 profiles.delete(&key).build()?;
855 }
856 }
857
858 for (room, event_types) in &changes.state {
859 let profile_changes = changes.profiles.get(room);
860
861 for (event_type, events) in event_types {
862 for (state_key, raw_event) in events {
863 let key = self.encode_key(keys::ROOM_STATE, (room, event_type, state_key));
864 state
865 .put(&self.serialize_value(&raw_event)?)
866 .with_key(key.clone())
867 .build()?;
868 stripped_state.delete(&key).build()?;
869
870 if *event_type == StateEventType::RoomMember {
871 let event =
872 match raw_event.deserialize_as_unchecked::<SyncRoomMemberEvent>() {
873 Ok(ev) => ev,
874 Err(e) => {
875 let event_id: Option<String> =
876 raw_event.get_field("event_id").ok().flatten();
877 debug!(event_id, "Failed to deserialize member event: {e}");
878 continue;
879 }
880 };
881
882 let key = (room, state_key);
883
884 stripped_user_ids
885 .delete(&self.encode_key(keys::STRIPPED_USER_IDS, key))
886 .build()?;
887
888 user_ids
889 .put(&self.serialize_value(&RoomMember::from(&event))?)
890 .with_key(self.encode_key(keys::USER_IDS, key))
891 .build()?;
892
893 if let Some(profile) =
894 profile_changes.and_then(|p| p.get(event.state_key()))
895 {
896 profiles
897 .put(&self.serialize_value(&profile)?)
898 .with_key(self.encode_key(keys::PROFILES, key))
899 .build()?;
900 }
901 }
902 }
903 }
904 }
905 }
906
907 if !changes.room_infos.is_empty() {
908 let room_infos = tx.object_store(keys::ROOM_INFOS)?;
909 for (room_id, room_info) in &changes.room_infos {
910 room_infos
911 .put(&self.serialize_value(&room_info)?)
912 .with_key(self.encode_key(keys::ROOM_INFOS, room_id))
913 .build()?;
914 }
915 }
916
917 if !changes.presence.is_empty() {
918 let store = tx.object_store(keys::PRESENCE)?;
919 for (sender, event) in &changes.presence {
920 store
921 .put(&self.serialize_value(&event)?)
922 .with_key(self.encode_key(keys::PRESENCE, sender))
923 .build()?;
924 }
925 }
926
927 if !changes.stripped_state.is_empty() {
928 let store = tx.object_store(keys::STRIPPED_ROOM_STATE)?;
929 let user_ids = tx.object_store(keys::STRIPPED_USER_IDS)?;
930
931 for (room, event_types) in &changes.stripped_state {
932 for (event_type, events) in event_types {
933 for (state_key, raw_event) in events {
934 let key = self
935 .encode_key(keys::STRIPPED_ROOM_STATE, (room, event_type, state_key));
936 store.put(&self.serialize_value(&raw_event)?).with_key(key).build()?;
937
938 if *event_type == StateEventType::RoomMember {
939 let event = match raw_event
940 .deserialize_as_unchecked::<StrippedRoomMemberEvent>()
941 {
942 Ok(ev) => ev,
943 Err(e) => {
944 let event_id: Option<String> =
945 raw_event.get_field("event_id").ok().flatten();
946 debug!(
947 event_id,
948 "Failed to deserialize stripped member event: {e}"
949 );
950 continue;
951 }
952 };
953
954 let key = (room, state_key);
955
956 user_ids
957 .put(&self.serialize_value(&RoomMember::from(&event))?)
958 .with_key(self.encode_key(keys::STRIPPED_USER_IDS, key))
959 .build()?;
960 }
961 }
962 }
963 }
964 }
965
966 if !changes.receipts.is_empty() {
967 let room_user_receipts = tx.object_store(keys::ROOM_USER_RECEIPTS)?;
968 let room_event_receipts = tx.object_store(keys::ROOM_EVENT_RECEIPTS)?;
969
970 for (room, content) in &changes.receipts {
971 for (event_id, receipts) in &content.0 {
972 for (receipt_type, receipts) in receipts {
973 for (user_id, receipt) in receipts {
974 let key = match receipt.thread.as_str() {
975 Some(thread_id) => self.encode_key(
976 keys::ROOM_USER_RECEIPTS,
977 (room, receipt_type, thread_id, user_id),
978 ),
979 None => self.encode_key(
980 keys::ROOM_USER_RECEIPTS,
981 (room, receipt_type, user_id),
982 ),
983 };
984
985 if let Some((old_event, _)) =
986 room_user_receipts.get(&key).await?.and_then(|f| {
987 self.deserialize_value::<(OwnedEventId, Receipt)>(&f).ok()
988 })
989 {
990 let key = match receipt.thread.as_str() {
991 Some(thread_id) => self.encode_key(
992 keys::ROOM_EVENT_RECEIPTS,
993 (room, receipt_type, thread_id, old_event, user_id),
994 ),
995 None => self.encode_key(
996 keys::ROOM_EVENT_RECEIPTS,
997 (room, receipt_type, old_event, user_id),
998 ),
999 };
1000 room_event_receipts.delete(&key).build()?;
1001 }
1002
1003 room_user_receipts
1004 .put(&self.serialize_value(&(event_id, receipt))?)
1005 .with_key(key)
1006 .build()?;
1007
1008 let key = match receipt.thread.as_str() {
1010 Some(thread_id) => self.encode_key(
1011 keys::ROOM_EVENT_RECEIPTS,
1012 (room, receipt_type, thread_id, event_id, user_id),
1013 ),
1014 None => self.encode_key(
1015 keys::ROOM_EVENT_RECEIPTS,
1016 (room, receipt_type, event_id, user_id),
1017 ),
1018 };
1019 room_event_receipts
1020 .put(&self.serialize_value(&(user_id, receipt))?)
1021 .with_key(key)
1022 .build()?;
1023 }
1024 }
1025 }
1026 }
1027 }
1028
1029 if !changes.redactions.is_empty() {
1030 let state = tx.object_store(keys::ROOM_STATE)?;
1031 let room_info = tx.object_store(keys::ROOM_INFOS)?;
1032
1033 for (room_id, redactions) in &changes.redactions {
1034 let range = self.encode_to_range(keys::ROOM_STATE, room_id);
1035 let Some(mut cursor) = state.open_cursor().with_query(&range).await? else {
1036 continue;
1037 };
1038
1039 let mut redaction_rules = None;
1040
1041 while let Some(value) = cursor.next_record().await? {
1042 let Some(key) = cursor.key::<JsValue>()? else {
1043 break;
1044 };
1045
1046 let raw_evt = self.deserialize_value::<Raw<AnySyncStateEvent>>(&value)?;
1047 if let Ok(Some(event_id)) = raw_evt.get_field::<OwnedEventId>("event_id") {
1048 if let Some(redaction) = redactions.get(&event_id) {
1049 let redaction_rules = {
1050 if redaction_rules.is_none() {
1051 redaction_rules.replace(room_info
1052 .get(&self.encode_key(keys::ROOM_INFOS, room_id))
1053 .await?
1054 .and_then(|f| self.deserialize_value::<RoomInfo>(&f).ok())
1055 .map(|info| info.room_version_rules_or_default())
1056 .unwrap_or_else(|| {
1057 warn!(?room_id, "Unable to get the room version rules, defaulting to rules for room version {ROOM_VERSION_FALLBACK}");
1058 ROOM_VERSION_RULES_FALLBACK
1059 }).redaction
1060 );
1061 }
1062 redaction_rules.as_ref().unwrap()
1063 };
1064
1065 let redacted = redact(
1066 raw_evt.deserialize_as::<CanonicalJsonObject>()?,
1067 redaction_rules,
1068 Some(RedactedBecause::from_raw_event(redaction)?),
1069 )
1070 .map_err(StoreError::Redaction)?;
1071 state.put(&self.serialize_value(&redacted)?).with_key(key).build()?;
1072 }
1073 }
1074 }
1075 }
1076 }
1077
1078 tx.commit().await.map_err(|e| e.into())
1079 }
1080
1081 async fn get_presence_event(&self, user_id: &UserId) -> Result<Option<Raw<PresenceEvent>>> {
1082 self.inner
1083 .transaction(keys::PRESENCE)
1084 .with_mode(TransactionMode::Readonly)
1085 .build()?
1086 .object_store(keys::PRESENCE)?
1087 .get(&self.encode_key(keys::PRESENCE, user_id))
1088 .await?
1089 .map(|f| self.deserialize_value(&f))
1090 .transpose()
1091 }
1092
1093 async fn get_presence_events(
1094 &self,
1095 user_ids: &[OwnedUserId],
1096 ) -> Result<Vec<Raw<PresenceEvent>>> {
1097 if user_ids.is_empty() {
1098 return Ok(Vec::new());
1099 }
1100
1101 let txn =
1102 self.inner.transaction(keys::PRESENCE).with_mode(TransactionMode::Readonly).build()?;
1103 let store = txn.object_store(keys::PRESENCE)?;
1104
1105 let mut events = Vec::with_capacity(user_ids.len());
1106
1107 for user_id in user_ids {
1108 if let Some(event) = store
1109 .get(&self.encode_key(keys::PRESENCE, user_id))
1110 .await?
1111 .map(|f| self.deserialize_value(&f))
1112 .transpose()?
1113 {
1114 events.push(event)
1115 }
1116 }
1117
1118 Ok(events)
1119 }
1120
1121 async fn get_state_event(
1122 &self,
1123 room_id: &RoomId,
1124 event_type: StateEventType,
1125 state_key: &str,
1126 ) -> Result<Option<RawAnySyncOrStrippedState>> {
1127 Ok(self
1128 .get_state_events_for_keys(room_id, event_type, &[state_key])
1129 .await?
1130 .into_iter()
1131 .next())
1132 }
1133
1134 async fn get_state_events(
1135 &self,
1136 room_id: &RoomId,
1137 event_type: StateEventType,
1138 ) -> Result<Vec<RawAnySyncOrStrippedState>> {
1139 let stripped_range =
1140 self.encode_to_range(keys::STRIPPED_ROOM_STATE, (room_id, &event_type));
1141 let stripped_events = self
1142 .inner
1143 .transaction(keys::STRIPPED_ROOM_STATE)
1144 .with_mode(TransactionMode::Readonly)
1145 .build()?
1146 .object_store(keys::STRIPPED_ROOM_STATE)?
1147 .get_all()
1148 .with_query(&stripped_range)
1149 .await?
1150 .filter_map(Result::ok)
1151 .filter_map(|f| {
1152 self.deserialize_value(&f).ok().map(RawAnySyncOrStrippedState::Stripped)
1153 })
1154 .collect::<Vec<_>>();
1155
1156 if !stripped_events.is_empty() {
1157 return Ok(stripped_events);
1158 }
1159
1160 let range = self.encode_to_range(keys::ROOM_STATE, (room_id, event_type));
1161 Ok(self
1162 .inner
1163 .transaction(keys::ROOM_STATE)
1164 .with_mode(TransactionMode::Readonly)
1165 .build()?
1166 .object_store(keys::ROOM_STATE)?
1167 .get_all()
1168 .with_query(&range)
1169 .await?
1170 .filter_map(Result::ok)
1171 .filter_map(|f| self.deserialize_value(&f).ok().map(RawAnySyncOrStrippedState::Sync))
1172 .collect::<Vec<_>>())
1173 }
1174
1175 async fn get_state_events_for_keys(
1176 &self,
1177 room_id: &RoomId,
1178 event_type: StateEventType,
1179 state_keys: &[&str],
1180 ) -> Result<Vec<RawAnySyncOrStrippedState>> {
1181 if state_keys.is_empty() {
1182 return Ok(Vec::new());
1183 }
1184
1185 let mut events = Vec::with_capacity(state_keys.len());
1186
1187 {
1188 let txn = self
1189 .inner
1190 .transaction(keys::STRIPPED_ROOM_STATE)
1191 .with_mode(TransactionMode::Readonly)
1192 .build()?;
1193 let store = txn.object_store(keys::STRIPPED_ROOM_STATE)?;
1194
1195 for state_key in state_keys {
1196 if let Some(event) =
1197 store
1198 .get(&self.encode_key(
1199 keys::STRIPPED_ROOM_STATE,
1200 (room_id, &event_type, state_key),
1201 ))
1202 .await?
1203 .map(|f| self.deserialize_value(&f))
1204 .transpose()?
1205 {
1206 events.push(RawAnySyncOrStrippedState::Stripped(event));
1207 }
1208 }
1209
1210 if !events.is_empty() {
1211 return Ok(events);
1212 }
1213 }
1214
1215 let txn = self
1216 .inner
1217 .transaction(keys::ROOM_STATE)
1218 .with_mode(TransactionMode::Readonly)
1219 .build()?;
1220 let store = txn.object_store(keys::ROOM_STATE)?;
1221
1222 for state_key in state_keys {
1223 if let Some(event) = store
1224 .get(&self.encode_key(keys::ROOM_STATE, (room_id, &event_type, state_key)))
1225 .await?
1226 .map(|f| self.deserialize_value(&f))
1227 .transpose()?
1228 {
1229 events.push(RawAnySyncOrStrippedState::Sync(event));
1230 }
1231 }
1232
1233 Ok(events)
1234 }
1235
1236 async fn get_profile(
1237 &self,
1238 room_id: &RoomId,
1239 user_id: &UserId,
1240 ) -> Result<Option<MinimalRoomMemberEvent>> {
1241 self.inner
1242 .transaction(keys::PROFILES)
1243 .with_mode(TransactionMode::Readonly)
1244 .build()?
1245 .object_store(keys::PROFILES)?
1246 .get(&self.encode_key(keys::PROFILES, (room_id, user_id)))
1247 .await?
1248 .map(|f| self.deserialize_value(&f))
1249 .transpose()
1250 }
1251
1252 async fn get_profiles<'a>(
1253 &self,
1254 room_id: &RoomId,
1255 user_ids: &'a [OwnedUserId],
1256 ) -> Result<BTreeMap<&'a UserId, MinimalRoomMemberEvent>> {
1257 if user_ids.is_empty() {
1258 return Ok(BTreeMap::new());
1259 }
1260
1261 let txn =
1262 self.inner.transaction(keys::PROFILES).with_mode(TransactionMode::Readonly).build()?;
1263 let store = txn.object_store(keys::PROFILES)?;
1264
1265 let mut profiles = BTreeMap::new();
1266 for user_id in user_ids {
1267 if let Some(profile) = store
1268 .get(&self.encode_key(keys::PROFILES, (room_id, user_id)))
1269 .await?
1270 .map(|f| self.deserialize_value(&f))
1271 .transpose()?
1272 {
1273 profiles.insert(user_id.as_ref(), profile);
1274 }
1275 }
1276
1277 Ok(profiles)
1278 }
1279
1280 async fn get_room_infos(&self, room_load_settings: &RoomLoadSettings) -> Result<Vec<RoomInfo>> {
1281 let transaction = self
1282 .inner
1283 .transaction(keys::ROOM_INFOS)
1284 .with_mode(TransactionMode::Readonly)
1285 .build()?;
1286
1287 let object_store = transaction.object_store(keys::ROOM_INFOS)?;
1288
1289 Ok(match room_load_settings {
1290 RoomLoadSettings::All => object_store
1291 .get_all()
1292 .await?
1293 .map(|room_info| self.deserialize_value::<RoomInfo>(&room_info?))
1294 .collect::<Result<_>>()?,
1295
1296 RoomLoadSettings::One(room_id) => {
1297 match object_store.get(&self.encode_key(keys::ROOM_INFOS, room_id)).await? {
1298 Some(room_info) => vec![self.deserialize_value::<RoomInfo>(&room_info)?],
1299 None => vec![],
1300 }
1301 }
1302 })
1303 }
1304
1305 async fn get_users_with_display_name(
1306 &self,
1307 room_id: &RoomId,
1308 display_name: &DisplayName,
1309 ) -> Result<BTreeSet<OwnedUserId>> {
1310 self.inner
1311 .transaction(keys::DISPLAY_NAMES)
1312 .with_mode(TransactionMode::Readonly)
1313 .build()?
1314 .object_store(keys::DISPLAY_NAMES)?
1315 .get(&self.encode_key(
1316 keys::DISPLAY_NAMES,
1317 (
1318 room_id,
1319 display_name.as_normalized_str().unwrap_or_else(|| display_name.as_raw_str()),
1320 ),
1321 ))
1322 .await?
1323 .map(|f| self.deserialize_value::<BTreeSet<OwnedUserId>>(&f))
1324 .unwrap_or_else(|| Ok(Default::default()))
1325 }
1326
1327 async fn get_users_with_display_names<'a>(
1328 &self,
1329 room_id: &RoomId,
1330 display_names: &'a [DisplayName],
1331 ) -> Result<HashMap<&'a DisplayName, BTreeSet<OwnedUserId>>> {
1332 let mut map = HashMap::new();
1333
1334 if display_names.is_empty() {
1335 return Ok(map);
1336 }
1337
1338 let txn = self
1339 .inner
1340 .transaction(keys::DISPLAY_NAMES)
1341 .with_mode(TransactionMode::Readonly)
1342 .build()?;
1343 let store = txn.object_store(keys::DISPLAY_NAMES)?;
1344
1345 for display_name in display_names {
1346 if let Some(user_ids) = store
1347 .get(
1348 &self.encode_key(
1349 keys::DISPLAY_NAMES,
1350 (
1351 room_id,
1352 display_name
1353 .as_normalized_str()
1354 .unwrap_or_else(|| display_name.as_raw_str()),
1355 ),
1356 ),
1357 )
1358 .await?
1359 .map(|f| self.deserialize_value::<BTreeSet<OwnedUserId>>(&f))
1360 .transpose()?
1361 {
1362 map.insert(display_name, user_ids);
1363 }
1364 }
1365
1366 Ok(map)
1367 }
1368
1369 async fn get_account_data_event(
1370 &self,
1371 event_type: GlobalAccountDataEventType,
1372 ) -> Result<Option<Raw<AnyGlobalAccountDataEvent>>> {
1373 self.inner
1374 .transaction(keys::ACCOUNT_DATA)
1375 .with_mode(TransactionMode::Readonly)
1376 .build()?
1377 .object_store(keys::ACCOUNT_DATA)?
1378 .get(&self.encode_key(keys::ACCOUNT_DATA, event_type))
1379 .await?
1380 .map(|f| self.deserialize_value(&f))
1381 .transpose()
1382 }
1383
1384 async fn get_room_account_data_event(
1385 &self,
1386 room_id: &RoomId,
1387 event_type: RoomAccountDataEventType,
1388 ) -> Result<Option<Raw<AnyRoomAccountDataEvent>>> {
1389 self.inner
1390 .transaction(keys::ROOM_ACCOUNT_DATA)
1391 .with_mode(TransactionMode::Readonly)
1392 .build()?
1393 .object_store(keys::ROOM_ACCOUNT_DATA)?
1394 .get(&self.encode_key(keys::ROOM_ACCOUNT_DATA, (room_id, event_type)))
1395 .await?
1396 .map(|f| self.deserialize_value(&f))
1397 .transpose()
1398 }
1399
1400 async fn get_user_room_receipt_event(
1401 &self,
1402 room_id: &RoomId,
1403 receipt_type: ReceiptType,
1404 thread: ReceiptThread,
1405 user_id: &UserId,
1406 ) -> Result<Option<(OwnedEventId, Receipt)>> {
1407 let key = match thread.as_str() {
1408 Some(thread_id) => self
1409 .encode_key(keys::ROOM_USER_RECEIPTS, (room_id, receipt_type, thread_id, user_id)),
1410 None => self.encode_key(keys::ROOM_USER_RECEIPTS, (room_id, receipt_type, user_id)),
1411 };
1412 self.inner
1413 .transaction(keys::ROOM_USER_RECEIPTS)
1414 .with_mode(TransactionMode::Readonly)
1415 .build()?
1416 .object_store(keys::ROOM_USER_RECEIPTS)?
1417 .get(&key)
1418 .await?
1419 .map(|f| self.deserialize_value(&f))
1420 .transpose()
1421 }
1422
1423 async fn get_event_room_receipt_events(
1424 &self,
1425 room_id: &RoomId,
1426 receipt_type: ReceiptType,
1427 thread: ReceiptThread,
1428 event_id: &EventId,
1429 ) -> Result<Vec<(OwnedUserId, Receipt)>> {
1430 let range = match thread.as_str() {
1431 Some(thread_id) => self.encode_to_range(
1432 keys::ROOM_EVENT_RECEIPTS,
1433 (room_id, receipt_type, thread_id, event_id),
1434 ),
1435 None => {
1436 self.encode_to_range(keys::ROOM_EVENT_RECEIPTS, (room_id, receipt_type, event_id))
1437 }
1438 };
1439 let tx = self
1440 .inner
1441 .transaction(keys::ROOM_EVENT_RECEIPTS)
1442 .with_mode(TransactionMode::Readonly)
1443 .build()?;
1444 let store = tx.object_store(keys::ROOM_EVENT_RECEIPTS)?;
1445
1446 Ok(store
1447 .get_all()
1448 .with_query(&range)
1449 .await?
1450 .filter_map(Result::ok)
1451 .filter_map(|f| self.deserialize_value(&f).ok())
1452 .collect::<Vec<_>>())
1453 }
1454
1455 async fn get_custom_value(&self, key: &[u8]) -> Result<Option<Vec<u8>>> {
1456 let jskey = &JsValue::from_str(core::str::from_utf8(key).map_err(StoreError::Codec)?);
1457 self.get_custom_value_for_js(jskey).await
1458 }
1459
1460 async fn set_custom_value(&self, key: &[u8], value: Vec<u8>) -> Result<Option<Vec<u8>>> {
1461 let jskey = JsValue::from_str(core::str::from_utf8(key).map_err(StoreError::Codec)?);
1462
1463 let prev = self.get_custom_value_for_js(&jskey).await?;
1464
1465 let tx =
1466 self.inner.transaction(keys::CUSTOM).with_mode(TransactionMode::Readwrite).build()?;
1467
1468 tx.object_store(keys::CUSTOM)?
1469 .put(&self.serialize_value(&value)?)
1470 .with_key(jskey)
1471 .build()?;
1472
1473 tx.commit().await.map_err(IndexeddbStateStoreError::from)?;
1474 Ok(prev)
1475 }
1476
1477 async fn remove_custom_value(&self, key: &[u8]) -> Result<Option<Vec<u8>>> {
1478 let jskey = JsValue::from_str(core::str::from_utf8(key).map_err(StoreError::Codec)?);
1479
1480 let prev = self.get_custom_value_for_js(&jskey).await?;
1481
1482 let tx =
1483 self.inner.transaction(keys::CUSTOM).with_mode(TransactionMode::Readwrite).build()?;
1484
1485 tx.object_store(keys::CUSTOM)?.delete(&jskey).build()?;
1486
1487 tx.commit().await.map_err(IndexeddbStateStoreError::from)?;
1488 Ok(prev)
1489 }
1490
1491 async fn remove_room(&self, room_id: &RoomId) -> Result<()> {
1492 let direct_stores = [keys::ROOM_INFOS, keys::ROOM_SEND_QUEUE, keys::DEPENDENT_SEND_QUEUE];
1494
1495 let prefixed_stores = [
1498 keys::PROFILES,
1499 keys::DISPLAY_NAMES,
1500 keys::USER_IDS,
1501 keys::ROOM_STATE,
1502 keys::ROOM_ACCOUNT_DATA,
1503 keys::ROOM_EVENT_RECEIPTS,
1504 keys::ROOM_USER_RECEIPTS,
1505 keys::STRIPPED_ROOM_STATE,
1506 keys::STRIPPED_USER_IDS,
1507 keys::THREAD_SUBSCRIPTIONS,
1508 ];
1509
1510 let all_stores = {
1511 let mut v = Vec::new();
1512 v.extend(prefixed_stores);
1513 v.extend(direct_stores);
1514 v
1515 };
1516
1517 let tx =
1518 self.inner.transaction(all_stores).with_mode(TransactionMode::Readwrite).build()?;
1519
1520 for store_name in direct_stores {
1521 tx.object_store(store_name)?.delete(&self.encode_key(store_name, room_id)).build()?;
1522 }
1523
1524 for store_name in prefixed_stores {
1525 let store = tx.object_store(store_name)?;
1526 let range = self.encode_to_range(store_name, room_id);
1527 for key in store.get_all_keys::<JsValue>().with_query(&range).await? {
1528 store.delete(&key?).build()?;
1529 }
1530 }
1531
1532 tx.commit().await.map_err(|e| e.into())
1533 }
1534
1535 async fn get_user_ids(
1536 &self,
1537 room_id: &RoomId,
1538 memberships: RoomMemberships,
1539 ) -> Result<Vec<OwnedUserId>> {
1540 let ids = self.get_user_ids_inner(room_id, memberships, true).await?;
1541 if !ids.is_empty() {
1542 return Ok(ids);
1543 }
1544 self.get_user_ids_inner(room_id, memberships, false).await
1545 }
1546
1547 async fn save_send_queue_request(
1548 &self,
1549 room_id: &RoomId,
1550 transaction_id: OwnedTransactionId,
1551 created_at: MilliSecondsSinceUnixEpoch,
1552 kind: QueuedRequestKind,
1553 priority: usize,
1554 ) -> Result<()> {
1555 let encoded_key = self.encode_key(keys::ROOM_SEND_QUEUE, room_id);
1556
1557 let tx = self
1558 .inner
1559 .transaction(keys::ROOM_SEND_QUEUE)
1560 .with_mode(TransactionMode::Readwrite)
1561 .build()?;
1562
1563 let obj = tx.object_store(keys::ROOM_SEND_QUEUE)?;
1564
1565 let prev = obj.get(&encoded_key).await?;
1570
1571 let mut prev = prev.map_or_else(
1572 || Ok(Vec::new()),
1573 |val| self.deserialize_value::<Vec<PersistedQueuedRequest>>(&val),
1574 )?;
1575
1576 prev.push(PersistedQueuedRequest {
1578 room_id: room_id.to_owned(),
1579 kind: Some(kind),
1580 transaction_id,
1581 error: None,
1582 is_wedged: None,
1583 event: None,
1584 priority: Some(priority),
1585 created_at,
1586 });
1587
1588 obj.put(&self.serialize_value(&prev)?).with_key(encoded_key).build()?;
1590
1591 tx.commit().await?;
1592
1593 Ok(())
1594 }
1595
1596 async fn update_send_queue_request(
1597 &self,
1598 room_id: &RoomId,
1599 transaction_id: &TransactionId,
1600 kind: QueuedRequestKind,
1601 ) -> Result<bool> {
1602 let encoded_key = self.encode_key(keys::ROOM_SEND_QUEUE, room_id);
1603
1604 let tx = self
1605 .inner
1606 .transaction(keys::ROOM_SEND_QUEUE)
1607 .with_mode(TransactionMode::Readwrite)
1608 .build()?;
1609
1610 let obj = tx.object_store(keys::ROOM_SEND_QUEUE)?;
1611
1612 let prev = obj.get(&encoded_key).await?;
1617
1618 let mut prev = prev.map_or_else(
1619 || Ok(Vec::new()),
1620 |val| self.deserialize_value::<Vec<PersistedQueuedRequest>>(&val),
1621 )?;
1622
1623 if let Some(entry) = prev.iter_mut().find(|entry| entry.transaction_id == transaction_id) {
1625 entry.kind = Some(kind);
1626 entry.error = None;
1628 entry.is_wedged = None;
1630 entry.event = None;
1631
1632 obj.put(&self.serialize_value(&prev)?).with_key(encoded_key).build()?;
1634 tx.commit().await?;
1635
1636 Ok(true)
1637 } else {
1638 Ok(false)
1639 }
1640 }
1641
1642 async fn remove_send_queue_request(
1643 &self,
1644 room_id: &RoomId,
1645 transaction_id: &TransactionId,
1646 ) -> Result<bool> {
1647 let encoded_key = self.encode_key(keys::ROOM_SEND_QUEUE, room_id);
1648
1649 let tx = self
1650 .inner
1651 .transaction([keys::ROOM_SEND_QUEUE, keys::DEPENDENT_SEND_QUEUE])
1652 .with_mode(TransactionMode::Readwrite)
1653 .build()?;
1654
1655 let obj = tx.object_store(keys::ROOM_SEND_QUEUE)?;
1656
1657 if let Some(val) = obj.get(&encoded_key).await? {
1662 let mut prev = self.deserialize_value::<Vec<PersistedQueuedRequest>>(&val)?;
1663 if let Some(pos) = prev.iter().position(|item| item.transaction_id == transaction_id) {
1664 prev.remove(pos);
1665
1666 if prev.is_empty() {
1667 obj.delete(&encoded_key).build()?;
1668 } else {
1669 obj.put(&self.serialize_value(&prev)?).with_key(encoded_key).build()?;
1670 }
1671
1672 tx.commit().await?;
1673 return Ok(true);
1674 }
1675 }
1676
1677 Ok(false)
1678 }
1679
1680 async fn load_send_queue_requests(&self, room_id: &RoomId) -> Result<Vec<QueuedRequest>> {
1681 let encoded_key = self.encode_key(keys::ROOM_SEND_QUEUE, room_id);
1682
1683 let prev = self
1686 .inner
1687 .transaction(keys::ROOM_SEND_QUEUE)
1688 .with_mode(TransactionMode::Readwrite)
1689 .build()?
1690 .object_store(keys::ROOM_SEND_QUEUE)?
1691 .get(&encoded_key)
1692 .await?;
1693
1694 let mut prev = prev.map_or_else(
1695 || Ok(Vec::new()),
1696 |val| self.deserialize_value::<Vec<PersistedQueuedRequest>>(&val),
1697 )?;
1698
1699 prev.sort_by(|lhs, rhs| rhs.priority.unwrap_or(0).cmp(&lhs.priority.unwrap_or(0)));
1701
1702 Ok(prev.into_iter().filter_map(PersistedQueuedRequest::into_queued_request).collect())
1703 }
1704
1705 async fn update_send_queue_request_status(
1706 &self,
1707 room_id: &RoomId,
1708 transaction_id: &TransactionId,
1709 error: Option<QueueWedgeError>,
1710 ) -> Result<()> {
1711 let encoded_key = self.encode_key(keys::ROOM_SEND_QUEUE, room_id);
1712
1713 let tx = self
1714 .inner
1715 .transaction(keys::ROOM_SEND_QUEUE)
1716 .with_mode(TransactionMode::Readwrite)
1717 .build()?;
1718
1719 let obj = tx.object_store(keys::ROOM_SEND_QUEUE)?;
1720
1721 if let Some(val) = obj.get(&encoded_key).await? {
1722 let mut prev = self.deserialize_value::<Vec<PersistedQueuedRequest>>(&val)?;
1723 if let Some(request) =
1724 prev.iter_mut().find(|item| item.transaction_id == transaction_id)
1725 {
1726 request.is_wedged = None;
1727 request.error = error;
1728 obj.put(&self.serialize_value(&prev)?).with_key(encoded_key).build()?;
1729 }
1730 }
1731
1732 tx.commit().await?;
1733
1734 Ok(())
1735 }
1736
1737 async fn load_rooms_with_unsent_requests(&self) -> Result<Vec<OwnedRoomId>> {
1738 let tx = self
1739 .inner
1740 .transaction(keys::ROOM_SEND_QUEUE)
1741 .with_mode(TransactionMode::Readwrite)
1742 .build()?;
1743
1744 let obj = tx.object_store(keys::ROOM_SEND_QUEUE)?;
1745
1746 let all_entries = obj
1747 .get_all()
1748 .await?
1749 .map(|item| self.deserialize_value::<Vec<PersistedQueuedRequest>>(&item?))
1750 .collect::<Result<Vec<Vec<PersistedQueuedRequest>>, _>>()?
1751 .into_iter()
1752 .flat_map(|vec| vec.into_iter().map(|item| item.room_id))
1753 .collect::<BTreeSet<_>>();
1754
1755 Ok(all_entries.into_iter().collect())
1756 }
1757
1758 async fn save_dependent_queued_request(
1759 &self,
1760 room_id: &RoomId,
1761 parent_txn_id: &TransactionId,
1762 own_txn_id: ChildTransactionId,
1763 created_at: MilliSecondsSinceUnixEpoch,
1764 content: DependentQueuedRequestKind,
1765 ) -> Result<()> {
1766 let encoded_key = self.encode_key(keys::DEPENDENT_SEND_QUEUE, room_id);
1767
1768 let tx = self
1769 .inner
1770 .transaction(keys::DEPENDENT_SEND_QUEUE)
1771 .with_mode(TransactionMode::Readwrite)
1772 .build()?;
1773
1774 let obj = tx.object_store(keys::DEPENDENT_SEND_QUEUE)?;
1775
1776 let prev = obj.get(&encoded_key).await?;
1779
1780 let mut prev = prev.map_or_else(
1781 || Ok(Vec::new()),
1782 |val| self.deserialize_value::<Vec<DependentQueuedRequest>>(&val),
1783 )?;
1784
1785 prev.push(DependentQueuedRequest {
1787 kind: content,
1788 parent_transaction_id: parent_txn_id.to_owned(),
1789 own_transaction_id: own_txn_id,
1790 parent_key: None,
1791 created_at,
1792 });
1793
1794 obj.put(&self.serialize_value(&prev)?).with_key(encoded_key).build()?;
1796
1797 tx.commit().await?;
1798
1799 Ok(())
1800 }
1801
1802 async fn update_dependent_queued_request(
1803 &self,
1804 room_id: &RoomId,
1805 own_transaction_id: &ChildTransactionId,
1806 new_content: DependentQueuedRequestKind,
1807 ) -> Result<bool> {
1808 let encoded_key = self.encode_key(keys::DEPENDENT_SEND_QUEUE, room_id);
1809
1810 let tx = self
1811 .inner
1812 .transaction(keys::DEPENDENT_SEND_QUEUE)
1813 .with_mode(TransactionMode::Readwrite)
1814 .build()?;
1815
1816 let obj = tx.object_store(keys::DEPENDENT_SEND_QUEUE)?;
1817
1818 let prev = obj.get(&encoded_key).await?;
1821
1822 let mut prev = prev.map_or_else(
1823 || Ok(Vec::new()),
1824 |val| self.deserialize_value::<Vec<DependentQueuedRequest>>(&val),
1825 )?;
1826
1827 let mut found = false;
1829 for entry in prev.iter_mut() {
1830 if entry.own_transaction_id == *own_transaction_id {
1831 found = true;
1832 entry.kind = new_content;
1833 break;
1834 }
1835 }
1836
1837 if found {
1838 obj.put(&self.serialize_value(&prev)?).with_key(encoded_key).build()?;
1839 tx.commit().await?;
1840 }
1841
1842 Ok(found)
1843 }
1844
1845 async fn mark_dependent_queued_requests_as_ready(
1846 &self,
1847 room_id: &RoomId,
1848 parent_txn_id: &TransactionId,
1849 parent_key: SentRequestKey,
1850 ) -> Result<usize> {
1851 let encoded_key = self.encode_key(keys::DEPENDENT_SEND_QUEUE, room_id);
1852
1853 let tx = self
1854 .inner
1855 .transaction(keys::DEPENDENT_SEND_QUEUE)
1856 .with_mode(TransactionMode::Readwrite)
1857 .build()?;
1858
1859 let obj = tx.object_store(keys::DEPENDENT_SEND_QUEUE)?;
1860
1861 let prev = obj.get(&encoded_key).await?;
1864
1865 let mut prev = prev.map_or_else(
1866 || Ok(Vec::new()),
1867 |val| self.deserialize_value::<Vec<DependentQueuedRequest>>(&val),
1868 )?;
1869
1870 let mut num_updated = 0;
1872 for entry in prev.iter_mut().filter(|entry| entry.parent_transaction_id == parent_txn_id) {
1873 entry.parent_key = Some(parent_key.clone());
1874 num_updated += 1;
1875 }
1876
1877 if num_updated > 0 {
1878 obj.put(&self.serialize_value(&prev)?).with_key(encoded_key).build()?;
1879 tx.commit().await?;
1880 }
1881
1882 Ok(num_updated)
1883 }
1884
1885 async fn remove_dependent_queued_request(
1886 &self,
1887 room_id: &RoomId,
1888 txn_id: &ChildTransactionId,
1889 ) -> Result<bool> {
1890 let encoded_key = self.encode_key(keys::DEPENDENT_SEND_QUEUE, room_id);
1891
1892 let tx = self
1893 .inner
1894 .transaction(keys::DEPENDENT_SEND_QUEUE)
1895 .with_mode(TransactionMode::Readwrite)
1896 .build()?;
1897
1898 let obj = tx.object_store(keys::DEPENDENT_SEND_QUEUE)?;
1899
1900 if let Some(val) = obj.get(&encoded_key).await? {
1903 let mut prev = self.deserialize_value::<Vec<DependentQueuedRequest>>(&val)?;
1904 if let Some(pos) = prev.iter().position(|item| item.own_transaction_id == *txn_id) {
1905 prev.remove(pos);
1906
1907 if prev.is_empty() {
1908 obj.delete(&encoded_key).build()?;
1909 } else {
1910 obj.put(&self.serialize_value(&prev)?).with_key(encoded_key).build()?;
1911 }
1912
1913 tx.commit().await?;
1914 return Ok(true);
1915 }
1916 }
1917
1918 Ok(false)
1919 }
1920
1921 async fn load_dependent_queued_requests(
1922 &self,
1923 room_id: &RoomId,
1924 ) -> Result<Vec<DependentQueuedRequest>> {
1925 let encoded_key = self.encode_key(keys::DEPENDENT_SEND_QUEUE, room_id);
1926
1927 let prev = self
1929 .inner
1930 .transaction(keys::DEPENDENT_SEND_QUEUE)
1931 .with_mode(TransactionMode::Readwrite)
1932 .build()?
1933 .object_store(keys::DEPENDENT_SEND_QUEUE)?
1934 .get(&encoded_key)
1935 .await?;
1936
1937 prev.map_or_else(
1938 || Ok(Vec::new()),
1939 |val| self.deserialize_value::<Vec<DependentQueuedRequest>>(&val),
1940 )
1941 }
1942
1943 async fn upsert_thread_subscription(
1944 &self,
1945 room: &RoomId,
1946 thread_id: &EventId,
1947 subscription: StoredThreadSubscription,
1948 ) -> Result<()> {
1949 let encoded_key = self.encode_key(keys::THREAD_SUBSCRIPTIONS, (room, thread_id));
1950
1951 let tx = self
1952 .inner
1953 .transaction(keys::THREAD_SUBSCRIPTIONS)
1954 .with_mode(TransactionMode::Readwrite)
1955 .build()?;
1956 let obj = tx.object_store(keys::THREAD_SUBSCRIPTIONS)?;
1957
1958 let mut new = PersistedThreadSubscription::from(subscription);
1959
1960 if let Some(previous_value) = obj.get(&encoded_key).await? {
1962 let previous: PersistedThreadSubscription = self.deserialize_value(&previous_value)?;
1963
1964 if new == previous {
1966 return Ok(());
1967 }
1968 if !compare_thread_subscription_bump_stamps(previous.bump_stamp, &mut new.bump_stamp) {
1969 return Ok(());
1970 }
1971 }
1972
1973 let serialized_value = self.serialize_value(&new);
1974 obj.put(&serialized_value?).with_key(encoded_key).build()?;
1975
1976 tx.commit().await?;
1977
1978 Ok(())
1979 }
1980
1981 async fn load_thread_subscription(
1982 &self,
1983 room: &RoomId,
1984 thread_id: &EventId,
1985 ) -> Result<Option<StoredThreadSubscription>> {
1986 let encoded_key = self.encode_key(keys::THREAD_SUBSCRIPTIONS, (room, thread_id));
1987
1988 let js_value = self
1989 .inner
1990 .transaction(keys::THREAD_SUBSCRIPTIONS)
1991 .with_mode(TransactionMode::Readonly)
1992 .build()?
1993 .object_store(keys::THREAD_SUBSCRIPTIONS)?
1994 .get(&encoded_key)
1995 .await?;
1996
1997 let Some(js_value) = js_value else {
1998 return Ok(None);
2000 };
2001
2002 let sub: PersistedThreadSubscription = self.deserialize_value(&js_value)?;
2003
2004 let status = ThreadSubscriptionStatus::from_str(&sub.status).map_err(|_| {
2005 StoreError::InvalidData {
2006 details: format!(
2007 "invalid thread status for room {room} and thread {thread_id}: {}",
2008 sub.status
2009 ),
2010 }
2011 })?;
2012
2013 Ok(Some(StoredThreadSubscription { status, bump_stamp: sub.bump_stamp }))
2014 }
2015
2016 async fn remove_thread_subscription(&self, room: &RoomId, thread_id: &EventId) -> Result<()> {
2017 let encoded_key = self.encode_key(keys::THREAD_SUBSCRIPTIONS, (room, thread_id));
2018
2019 let transaction = self
2020 .inner
2021 .transaction(keys::THREAD_SUBSCRIPTIONS)
2022 .with_mode(TransactionMode::Readwrite)
2023 .build()?;
2024 transaction.object_store(keys::THREAD_SUBSCRIPTIONS)?.delete(&encoded_key).await?;
2025 transaction.commit().await?;
2026
2027 Ok(())
2028 }
2029
2030 #[allow(clippy::unused_async)]
2031 async fn optimize(&self) -> Result<()> {
2032 Ok(())
2033 }
2034
2035 #[allow(clippy::unused_async)]
2036 async fn get_size(&self) -> Result<Option<usize>> {
2037 Ok(None)
2038 }
2039});
2040
2041#[derive(Debug, Serialize, Deserialize)]
2043struct RoomMember {
2044 user_id: OwnedUserId,
2045 membership: MembershipState,
2046}
2047
2048impl From<&SyncStateEvent<RoomMemberEventContent>> for RoomMember {
2049 fn from(event: &SyncStateEvent<RoomMemberEventContent>) -> Self {
2050 Self { user_id: event.state_key().clone(), membership: event.membership().clone() }
2051 }
2052}
2053
2054impl From<&StrippedRoomMemberEvent> for RoomMember {
2055 fn from(event: &StrippedRoomMemberEvent) -> Self {
2056 Self { user_id: event.state_key.clone(), membership: event.content.membership.clone() }
2057 }
2058}
2059
2060#[cfg(test)]
2061mod migration_tests {
2062 use assert_matches2::assert_matches;
2063 use matrix_sdk_base::store::{QueuedRequestKind, SerializableEventContent};
2064 use ruma::{
2065 events::room::message::RoomMessageEventContent, room_id, OwnedRoomId, OwnedTransactionId,
2066 TransactionId,
2067 };
2068 use serde::{Deserialize, Serialize};
2069
2070 use crate::state_store::PersistedQueuedRequest;
2071
2072 #[derive(Serialize, Deserialize)]
2073 struct OldPersistedQueuedRequest {
2074 room_id: OwnedRoomId,
2075 event: SerializableEventContent,
2076 transaction_id: OwnedTransactionId,
2077 is_wedged: bool,
2078 }
2079
2080 #[test]
2084 fn test_migrating_persisted_queue_event_serialization() {
2085 let room_a_id = room_id!("!room_a:dummy.local");
2086 let transaction_id = TransactionId::new();
2087 let content =
2088 SerializableEventContent::new(&RoomMessageEventContent::text_plain("Hello").into())
2089 .unwrap();
2090
2091 let old_persisted_queue_event = OldPersistedQueuedRequest {
2092 room_id: room_a_id.to_owned(),
2093 event: content,
2094 transaction_id: transaction_id.clone(),
2095 is_wedged: true,
2096 };
2097
2098 let serialized_persisted = serde_json::to_vec(&old_persisted_queue_event).unwrap();
2099
2100 let new_persisted: PersistedQueuedRequest =
2102 serde_json::from_slice(&serialized_persisted).unwrap();
2103
2104 assert_eq!(new_persisted.is_wedged, Some(true));
2105 assert!(new_persisted.error.is_none());
2106
2107 assert!(new_persisted.event.is_some());
2108 assert!(new_persisted.kind.is_none());
2109
2110 let queued = new_persisted.into_queued_request().unwrap();
2111 assert_matches!(queued.kind, QueuedRequestKind::Event { .. });
2112 assert_eq!(queued.transaction_id, transaction_id);
2113 assert!(queued.error.is_some());
2114 }
2115}
2116
2117#[cfg(all(test, target_family = "wasm"))]
2118mod tests {
2119 #[cfg(target_family = "wasm")]
2120 wasm_bindgen_test::wasm_bindgen_test_configure!(run_in_browser);
2121
2122 use matrix_sdk_base::statestore_integration_tests;
2123 use uuid::Uuid;
2124
2125 use super::{IndexeddbStateStore, Result};
2126
2127 async fn get_store() -> Result<IndexeddbStateStore> {
2128 let db_name = format!("test-state-plain-{}", Uuid::new_v4().as_hyphenated());
2129 Ok(IndexeddbStateStore::builder().name(db_name).build().await?)
2130 }
2131
2132 statestore_integration_tests!();
2133}
2134
2135#[cfg(all(test, target_family = "wasm"))]
2136mod encrypted_tests {
2137 #[cfg(target_family = "wasm")]
2138 wasm_bindgen_test::wasm_bindgen_test_configure!(run_in_browser);
2139
2140 use matrix_sdk_base::statestore_integration_tests;
2141 use uuid::Uuid;
2142
2143 use super::{IndexeddbStateStore, Result};
2144
2145 async fn get_store() -> Result<IndexeddbStateStore> {
2146 let db_name = format!("test-state-encrypted-{}", Uuid::new_v4().as_hyphenated());
2147 let passphrase = format!("some_passphrase-{}", Uuid::new_v4().as_hyphenated());
2148 Ok(IndexeddbStateStore::builder().name(db_name).passphrase(passphrase).build().await?)
2149 }
2150
2151 statestore_integration_tests!();
2152}